Shared Vulnerabilities

If security was mainly a business owner’s responsibility, Cloud security has to become a shared responsibility between the provider and the client. Your sensitive data is at risk if you don't take up your responsibility in this shared loop.

What stays in your hands are key security protocols such as :

  • protection of user’s passwords
  • access restrictions to files and devices
  • multi-factor authentication

The partnership involved between client and provider requires the client (business’ owner) to take preventative actions to protect their data.